-
1
-
-
13244269881
-
Lossless Generalized-LSB Data Embedding
-
Feb
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Lossless Generalized-LSB Data Embedding, IEEE Trans. Image Processing, vol. 14, no. 2, pp. 253-266, Feb. 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
2
-
-
34247156504
-
Reversible hiding in DCT-based compressed images
-
July
-
C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, Reversible hiding in DCT-based compressed images, Information Sciences, vol. 177, pp. 2768-2786, July 2007.
-
(2007)
Information Sciences
, vol.177
, pp. 2768-2786
-
-
Chang, C.C.1
Lin, C.C.2
Tseng, C.S.3
Tai, W.L.4
-
3
-
-
0036497685
-
A Steganographic Method Based upon JPEG and Quantization Table Modification
-
C. C. Chang, T. S. Chen, and L. Z. Chung, A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, vol. 141, 2002, pp. 123-138.
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
4
-
-
0037411306
-
Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy
-
July
-
C. C. Chang, J. Y. Hsiao, and C. S. Chan, Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, vol. 36, no. 7, pp. 1595-1683, July 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1595-1683
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
5
-
-
33751501445
-
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
-
C. C. Chang, W. L. Tai, and C. C. Lin, A Reversible Data Hiding Scheme Based on Side Match Vector Quantization, IEEE Trans. Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1301-1308, 2006.
-
(2006)
IEEE Trans. Circuits and Systems for Video Technology
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
6
-
-
55549099235
-
A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding
-
October
-
C. C. Chang, Y. H. Chen, and C. C. Lin, A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding, Soft Computing, vol. 13, pp. 21-331, October 2008.
-
(2008)
Soft Computing
, vol.13
, pp. 21-331
-
-
Chang, C.C.1
Chen, Y.H.2
Lin, C.C.3
-
7
-
-
0035397229
-
A Novel SVD-and VQ-based Image Hiding Scheme
-
K. L. Chung, C. H. Shen and L. C. Chang, A Novel SVD-and VQ-based Image Hiding Scheme, Pattern Recognition Letters, vol. 22, no. 9, pp. 1051-1058, 2001.
-
(2001)
Pattern Recognition Letters
, vol.22
, Issue.9
, pp. 1051-1058
-
-
Chung, K.L.1
Shen, C.H.2
Chang, L.C.3
-
8
-
-
34249085398
-
Image Data Compression: Block Truncation Coding
-
B. V. Dasarathy, Image Data Compression: Block Truncation Coding, IEEE Computer Society Press, pp. 164-173, 1995.
-
(1995)
IEEE Computer Society Press
, pp. 164-173
-
-
Dasarathy, B.V.1
-
9
-
-
0017501281
-
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
-
W. Diffie and M. E. Hellman, Exhaustive Cryptanalysis of the NBS Data Encryption Standard, IEEE Computers, vol. 10, pp. 74-84, 1977.
-
(1977)
IEEE Computers
, vol.10
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
10
-
-
84961844573
-
Invertible Authentication Watermark for JPEG Images
-
J. Fridrich, M. Goljanb, R. Du, Invertible Authentication Watermark for JPEG Images, IEEE Int. Conf. Information Technology: Coding and Computing, pp. 223-227, 2001.
-
(2001)
IEEE Int. Conf. Information Technology: Coding and Computing
, pp. 223-227
-
-
Fridrich, J.1
Goljanb, M.2
Du, R.3
-
12
-
-
2342464968
-
Digital Steganography Utilizing Features of JPEG Images
-
E87-A
-
M. Iwata, K Miyake, and A. Shiozaki, Digital Steganography Utilizing Features of JPEG Images, IEICE Trans. Fundamentals, vol. E87-A, no. 4, pp. 929-936, April 2004.
-
(2004)
IEICE Trans. Fundamentals
, Issue.4
, pp. 929-936
-
-
Iwata, M.1
Miyake, K.2
Shiozaki, A.3
-
13
-
-
0001310847
-
A Method of Embedding Binary Data into JPEG Bitstreams
-
H. Kobayashi, Y. Noguchi and H. Kiya, A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Trans. Fundamentals, vol. 6, pp. 1469-1476, 2000.
-
(2000)
IEICE Trans. Fundamentals
, vol.6
, pp. 1469-1476
-
-
Kobayashi, H.1
Noguchi, Y.2
Kiya, H.3
-
15
-
-
68149149530
-
Reversible Steganographic Method with High Payload for JPEG Images
-
C. Y. Lin, C. C. Chang, and Y. Z. Wang, Reversible Steganographic Method with High Payload for JPEG Images, IEICE Trans. Information and Systems, vol. 91-D, no. 3, pp. 836-845, 2008.
-
(2008)
IEICE Trans. Information and Systems
, vol.91 D
, Issue.3
, pp. 836-845
-
-
Lin, C.Y.1
Chang, C.C.2
Wang, Y.Z.3
-
16
-
-
0033716537
-
High Capacity Image Steganographic Model
-
Y.K. Lee and L. H. Chen, High Capacity Image Steganographic Model, Proc. of IEEE International Conference on Vision, Image and Signal Processing, vol. 147, no. 3, pp. 288-294, 2000.
-
(2000)
Proc. of IEEE International Conference on Vision, Image and Signal Processing
, vol.147
, Issue.3
, pp. 288-294
-
-
Lee, Y.K.1
Chen, L.H.2
-
17
-
-
0038421787
-
Reversible Data Hiding
-
May
-
Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, Proc. of International Symposium on Circuits and Systems (ISCAS '03), vol. 2, pp. 912-915, May 2003.
-
(2003)
Proc. of International Symposium on Circuits and Systems (ISCAS '03)
, vol.2
, pp. 912-915
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
18
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystem
-
Feb
-
R.L. Rivest, A. Shamir, L. Adelman, A Method for Obtaining Digital Signatures and Public-key Cryptosystem, Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
19
-
-
0141862029
-
Reversible Data Embedding Using a Difference Expansion
-
Aug
-
J. Tian, Reversible Data Embedding Using a Difference Expansion, IEEE Trans. Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
21
-
-
0035283377
-
Image Hiding by Optimal LSB Substitution and Genetic Algorithm
-
R. Z. Wang, C. F. Lin and J. C. Lin, Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
22
-
-
0037028254
-
Distortionless Data Hiding Based on Integer Wavelet Transform
-
Dec
-
G. Xuan, J. Zhu, J. Chen, Y.-Q. Shi, Z. Ni, and W. Su, Distortionless Data Hiding Based on Integer Wavelet Transform, IEE Electronics Letters, vol. 38, no. 25, pp. 1646-1648, Dec. 2002.
-
(2002)
IEE Electronics Letters
, vol.38
, Issue.25
, pp. 1646-1648
-
-
Xuan, G.1
Zhu, J.2
Chen, J.3
Shi, Y.-Q.4
Ni, Z.5
Su, W.6
|